More Efficient Match-Making and Satisfiability The Five Card Trick

From MaRDI portal
Publication:5110898

DOI10.1007/3-540-46885-4_23zbMath1434.94064OpenAlexW2229812453MaRDI QIDQ5110898

Bert Den Boer

Publication date: 25 May 2020

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-46885-4_23




Related Items (28)

Card-based cryptographic protocols with a standard deck of cards using private operationsHow to construct physical zero-knowledge proofs for puzzles with a ``single loop conditionEfficient private PEZ protocols for symmetric functionsSecure multiparty computations without computersCard-based Protocols Using Triangle CardsEfficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed PointsMulti-party computation based on physical coinsPhysical ZKP protocols for Nurimisaki and KurodokoCard-minimal protocols for symmetric Boolean functions of more than seven inputsHide a liar: card-based ZKP protocol for UsowanCard-based zero-knowledge proof for the nearest neighbor property: zero-knowledge proof of ABC end viewActively revealing card attack on card-based protocolsSingle-shuffle card-based protocol with eight cards per gateCard-based ZKP protocol for NurimisakiAnother use of the five-card trick: card-minimal secure three-input majority function evaluationSecure computations through checking suits of playing cardsA card-minimal three-input and protocol using two shufflesCard-based protocols for secure ranking computationsA single shuffle is enough for secure card-based computation of any Boolean circuitEfficient generation of a card-based uniformly distributed random derangementSecurely computing the \(n\)-variable equality function with \(2n\) cardsComputations with a deck of cardsPractical card-based implementations of Yao's millionaire protocolCard-based protocols for securely computing the conjunction of multiple variablesCard-based protocols using unequal division shufflesCard-based cryptographic protocols for three-input functions using private operationsA secure three-input and protocol with a standard deck of minimal cardsInteractive physical ZKP for connectivity: applications to Nurikabe and Hitori






This page was built for publication: More Efficient Match-Making and Satisfiability The Five Card Trick